Skip to main content

Research on Detection Method of Malicious Node Based on Flood Attack in VANET

  • Conference paper
  • First Online:
6GN for Future Wireless Networks (6GN 2020)

Abstract

For the reason of the variability and mobility of VANET’s topology, it is easy to be attacked by attackers. This paper proposes two detection methods for TCP Synchronize Sequence Numbers (SYN) flood attacks and UDP traffic flood attacks in combination with the requirements of the rapid and real-time detection for malicious nodes in the security of the 5G VANET, and to enhance the ability to identify and detect malicious nodes. For the TCP SYN flood attack, the number of access requests with the same node ID is limited, and the number of semi-connections in Road Side Unit (RSU) is adjusted. For the UDP traffic flood attack, the RSU is used to monitor and analyze the data traffic of each node in VANET. Through the feasibility analysis, the above two detection methods can effectively detect flood attacks in VANET, thus assisting the network defense mechanism to ensure network security. Thereby providing guarantee for the security of VANET in the 5G communication environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, H.: Research on traffic information collection and processing methods in the Internet of Vehicles. Jilin University (2013)

    Google Scholar 

  2. Xu, C.: Impact of 5G connected vehicles on the development of autonomous driving technology. Inf. Commun. 46–47 (2018)

    Google Scholar 

  3. Lin, T.: Research on multi-path TCP transmission and control in vehicle networking. Dalian University of Technology (2017)

    Google Scholar 

  4. Nan, Y., Rongbao, K.: Analysis and protection of vehicle network security threats. Commun. Technol. 48(12), 1421–1426 (2015)

    Google Scholar 

  5. Chen, L.: Security threats and research status of Internet of Vehicles. http://wemedia.ifeng.com/73941858/wemedia.shtml. Accessed 16 Aug 2018

  6. Huang, Y., Wan, L., Li, X.: SYN flooding attack based on IP spoofing. Comput. Technol. Dev. 18(12), 159–161,165 (2008)

    Google Scholar 

  7. Zou, C., Liu, P., Tang, X.: Real-time defense of DHCP flood attack in SDN network. Comput. Appl. http://knsCnki.net/kcms/detail/51.1307.TP.20181203.1628.008.html. Accessed 16 Aug 2018

  8. Liu, P., Sheng, Z.: Defending against TCP SYN flooding with a new kind of SYN-agent. In: 2008 International Conference on Machine Learning and Cybernetics, Kunming, pp. 1218–1221 (2008)

    Google Scholar 

  9. Degirmencioglu, A., Erdogan, H.T., Mizani, M.A., Yılmaz, O.: A classification approach for adaptive mitigation of SYN flood attacks: preventing performance loss due to SYN flood attacks. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, pp. 1109-1112. IEEE (2016)

    Google Scholar 

  10. Verma, K., Hasbullah, H., Kumar, A.: An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET. In: 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 550–555. IEEE (2013)

    Google Scholar 

  11. Chen, W., Li, Y., Liu, W.: Analysis of the progress and key technologies of the connected car industry ZTE. http://kns.cnki.net/kcms/detail/34.1228.TN.20200217.1748.004.html. Accessed 21 Feb 2020

  12. Liangmin, W., Xiaolong, L., Chunxiao, L., Jing, Y., Weidong, Y.: Prospects of 5G telematics. J. Netw. Inf. Secur. 2(06), 1–12 (2016)

    Google Scholar 

  13. Tang, H., Zeng, Y.: Detection of SYN flood attack based on semi-join list. Comput. Eng. 37(19), 135–137,144 (2011)

    Google Scholar 

  14. Houmer, M., Hasnaoui, M.L., Elfergougui, A.: Security analysis of vehicular ad-hoc networks based on attack tree. In: 2018 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), Tangier, pp. 21–26. IEEE (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, Y., Li, Y., Wang, Y. (2020). Research on Detection Method of Malicious Node Based on Flood Attack in VANET. In: Wang, X., Leung, V.C.M., Li, K., Zhang, H., Hu, X., Liu, Q. (eds) 6GN for Future Wireless Networks. 6GN 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-030-63941-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63941-9_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63940-2

  • Online ISBN: 978-3-030-63941-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics